Third Party Risk Governance in a Diverse Environment

Slides:



Advertisements
Similar presentations
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Advertisements

National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
Developing a Records & Information Retention & Disposition Program:
IT Outsourcing Management
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
Payment Card Industry (PCI) Data Security Standard
Professional Systems Associates, Inc. We’ve been building powerful, people-oriented software solutions for commercial and government.
Network security policy: best practices
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
PCI 3.0 Boot Camp Payment Card Industry Data Security Standards 3.0.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
SEC835 Database and Web application security Information Security Architecture.
Information Systems Security Computer System Life Cycle Security.
Applied Technology Services, Inc. Your Partner in Technology Applied Technology Services, Inc. Your Partner in Technology.
David N. Wozei Systems Administrator, IT Auditor.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Chapter 6 of the Executive Guide manual Technology.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
VULNERABILITY ASSESSMENT FOR THE POLICE DEPARTMENT’S NETWORK.
Sandra C Security Advisor Energy Dan B Security Advisor Water
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Engineering Essential Characteristics Security Engineering Process Overview.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Screening activities Mike E. Farrell James E. Bartlett and Ghislaine C.Y. Gillessen Munich, January 2014.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Purchasing Cards. What is a Purchasing Card? It is a type of commercial credit card, used by organizations for payment of goods and services. This tool.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Kevin Watson and Ammar Ammar IT Asset Visibility.
CNOOC SES Ltd. VQHSE MS Vendor QHSE Management System
Security and resilience for Smart Hospitals Key findings
Managing Compliance for All Departments
Performing Risk Analysis and Testing: Outsource or In-house
Insider Connectivity Review & Savings Analysis
WSU IT Risk Assessment Process
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Cybersecurity - What’s Next? June 2017
JU September Stakeholder Engagement Conference Webinar #1
Compliance with hardening standards
Errors, Fraud, Risk Management, and Internal Controls
Introduction to the Federal Defense Acquisition Regulation
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
CMGT 431 Competitive Success/snaptutorial.com
CMGT 431 Education for Service-- snaptutorial.com.
CMGT 431 STUDY Lessons in Excellence--cmgt431study.com.
CMGT 431 Education for Service/tutorialrank.com
CMGT 431 Teaching Effectively-- snaptutorial.com.
CMGT 431 STUDY Education for Service- -cmgt431study.com.
I have many checklists: how do I get started with cyber security?
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Office 365 Security Assessment Workshop
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
RECORDS AND INFORMATION
AppExchange Security Certification
Effective Risk Benchmarking
Risk Mitigation & Incident Response Week 12
DSC Contract Management Committee Meeting
Employee Cybersecurity Program
The state of digital supplier risk management: In partners we trust
General Services Department State Purchasing Division
Presentation transcript:

Third Party Risk Governance in a Diverse Environment Iman Joshua CISO, Healthagen

How are most organizations handling Third Party Risk? The methods that we use to evaluate Third Party Risk are generally inadequate and do not provide a holistic view of that party or their relevant risk. What do we normally do? Questionnaires Onsite Visit 3rd Party Audit How can we design this process better?

An holistic approach to managing third party risk Classify Business Risk Data Classification Impact Categorize Vendors Engagement Capabilities Evaluation Tools Remediation Tracking

Categorizing Vendors

Third Party Risk Governance Program BUSINESS FORMS THIRD PARTY UNIVERSE THIRD PARTY GOVERNANCE eGRC TRACKING TOOL LAW FIRMS CATEGORY RISK GRID Encryption & Authentication Security Performance

How did we get here? Define required controls that all departments must follow Create an inventory of Third parties Procurement Business Contract reviews, submitted RFPs Educate Educate Educate! Vendor Conferences Employee training Create a “gate” in procurement and legal Identify a central searchable repository Determine which tools are going to be used for evaluation BSIMM VAST/Veracode Prevalent – Security Questionnaires Third Party Assessments – SIG, AUP, SOC, etc Security Scorecard

Centralized Portal for Tracking via Archer

Third Party Governance Controls Several controls added to the Third Party Governance Process specifically address cyber security risks: CONTROL DETAIL TYPE Standardized Information Gathering Tool(SIG) Questionnaire Full SIG for Hosting Third Parties 2015 Agreed Upon Procedures (AUP) 90+ Controls Reviewed by Third Party Controls Assessment Vendor Building Security In Maturity Model (vBSIMM) Software Security Maturity Assessment Performed by Assessor Conducted by Third Party and Shared with Assessor Code Scan Vulnerability Scan Controls Obtained Through Network Scanning of Internet Facing Endpoint Security Performance Controls Assessment Copyright 2015 Aetna Inc.

Standardized Information Gathering (SIG) ASSESSOR & THIRD PARTY EMAIL COMPLETED SIG SIG ASSESSMENT EXCHANGE PROVIDE THIRD PARTY OPPORTUNITY TO ANSWERS FOLLOW UP VIA EMAIL PRIOR TO MEETING SIG and SIG Hybrid areas: SIG Management Tool: Runs mismatch of Third Party SIG and Master SIG FINAL ACTION ITEM & SCORING • Compilation of questions to determine how IT and Data Security risks are managed across a broad spectrum of risk control areas Full SIG – over 1,500 questions • 95.0% Control Accomplishments “I like the fact that Company X is working to help the industry remove the need to complete assessments by providing the opportunity to complete one SIG and use it for additional engagements -” stated by multiple Third Parties eGRC TRACKING TOOL Awareness of Third Party IT and Data Security vulnerabilities SIG Master is compared to the Third Party SIG for vulnerabilities to be remediated Remediation action items for vulnerabilities tracked to completion and re-assessed for sign off / accountability REMEDIATION ACTION ITEMS STORED IN TRACKING TOOL & DOCUMENTED IN CONTRACTS Copyright 2015 Aetna Inc.

AUP vs SOC2 Determine a single control standard Determine if supplemental documentation will be accepted Engage a Third Party as a preferred Third Party Understand the difference between the AUP and the multiple types of SOC(s) Copyright 2015 Aetna Inc.

Vendor Building Security In Maturity Model (vBSIMM) ASSESSOR & THIRD PARTY COMPLETED vBSIMM ASSESSMENT REVIEW MTG PROVIDE TRAINING FINAL ACTION ITEM & SCORING vBSIMM PROCESS AREAS: ASSESSMENT & INITIAL SCORING SYSTEM: Architecture Analysis Code Review Security Testing Penetration Testing Configuration Management – Incident Response / Vulnerability Management Top Total Score = 15 points Top Total Score for each area = 3 points 0 = Not Implemented 1 = Low Maturity 2 = Medium Maturity 3 = High Mature Control Accomplishments Awareness of Third Party software development vulnerabilities Training provided to Third Party to improve maturity “Thank you for taking the time to teach us the process and the areas where our software development can be improved-” Third Party Remediation action items for vulnerabilities tracked to completion and re-assessed for sign off / accountability 90.0% eGRC TRACKING TOOL REMEDIATION ACTION ITEMS STORED IN TRACKING TOOL & DOCUMENTED IN CONTRACTS Copyright 2015 Aetna Inc.

Application Security and Third Party Risk Management What is vBSIMM? Simply put, vBSIMM is an assessment process that provides visibility into the maturity of a Third Party’s ability to deliver secure software by evaluating: Architecture Analysis Code Review Config / Vuln Mgmt vBSIMM Security Testing Penetration Testing vBSIMM Practices (1) Architecture Analysis Activity Third Party performs security design / architecture / feature review (threat models). Code Review Activity Third Party uses automated tools and/or manual review. Security Testing Activity Third Party ensures QA supports edge/boundary value condition testing. Penetration Testing Activity Third Party uses penetration testers to identify security vulnerabilities. Configuration Management - Incident Response / Vulnerability Management Third Party uses vulnerability/ incident data to modify security practices (prevention). Copyright 2015 Aetna Inc.

Security Alert & Performance Tool The intent is to provide awareness to vulnerabilities and help uplift Third Party's’ security posture to the maturity of your company. Copyright 2015 Aetna Inc.

How do we continue to educate others? Annual Vendor Conference Vendor Portal AV-ISAC

F. Iman Joshua ijoshua@aetna.com Thank you! Questions? F. Iman Joshua ijoshua@aetna.com